COMMUNICATIONS PROTOCOLS VPN VIRTUAL PRIVATE

Brand Owner (click to sort) Address Description
4IPNET 4IPNET, INC. c/o Meilan Liu, 3065 Washington Blvd.
3065 Washington Blvd.
Fremont CA 94539
Computer hardware, wireless access point (WAP) ...
BEC TECHNOLOGY CONSULTANTS, LLC BEC Technology Consultants, LLC 3939 Fairmont Dr
New Orleans LA 70122
A mesh network of temperature probes ...
BTC Technology Associates, Inc. 2045 Lakeshore Dr. Suite 526
New Orleans LA 70122
A mesh network of temperature probes ...
DAOS Li, De Xiong 1674 Hollenbeck Ave. #34
Sunnyvale CA 94087
Communication software for providing access to ...
MARVTECH Marvtech, Inc. 1921 Concourse Drive
San Jose CA 95131
Computer networking hardware; External modems; LAN ...
SHUTTLEBOX Li, De Xiong 1674 Hollenbeck Ave. #34
Sunnyvale CA 94087
Computer game software; Computer game software ...
SYSWAN TECHNOLOGIES SYSWAN TECHNOLOGIES, INC. Suite 101 #388
2050 Beavercreek Rd
Oregon City OR 97045
Computer hardware and software for setting ...
THE I.T. DEPARTMENT Texas Data Network Services Suite 214
4001 N. Shepherd Dr.
Houston TX 77018
Computer e-commerce software to allow users ...
 

Where the owner name is not linked, that owner no longer owns the brand

   
Technical Examples
  1. A virtual private network service provider, wherein virtual private network ("VPN") software for setting up a virtual private network connection is delivered from a server computer to one or more client computers over a computer network, such as the Internet. Once the VPN software is delivered to the client computers, it can be executed so that data communications are made as virtual private network communications under control of the VPN software. Because the VPN software is stored and maintained on a server computer, and preferably delivered to the various client computers on an as-needed basis, the distribution, integrity and updating of the VPN software is improved because the "master" version of the VPN software can be controlled and revised by merely accessing the server computer system, rather than by attempting to control and revise numerous copies of the VPN software resident on various, scattered client computers.